Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor. Such communications can include voice over IP (VoIP or Internet telephony), instant messaging (IM), collaboration and videoconference applications using fixed and mobile devices. CaaS has evolved along the same lines as Software as a Service (SaaS). CaaS brings social networking, cloud computing, and smartphones together, providing cloudtechnologies that let users communicate via voice, text, and rich media on whatever device they prefer to use. To compete in this marketplace, software vendors, enterprises, and service providers must introduce communications-enhanced services that meet a surging need for value, efficiency, cost reduction, and convenience. Through the hosted model, the CaaS provider manages everything, from the telecommunications infrastructure to the software integration platform for delivering communications offered at a guaranteed Quality of Service (QoS). As a result, businesses can selectively deploy communications features, applications, and devices on a pay-as-you-go, as-needed basis, reducing risks while eliminating capital costs associated with new services. CaaS offers flexibility and expandability that small and medium-sized business might not otherwise afford, allowing for the addition of devices, modes or coverage on demand. The network capacity and feature set can be changed from day to day if necessary so that functionality keeps pace with demand and resources are not wasted. There is no risk of the system becoming obsolete and requiring periodic major upgrades or replacement Advantages of Communication as a Service (CaaS) Fully Integrated Enterprise Class Unified Communication: By managing the LAN/WAN, the vendor can guarantee consistent Quality of Service (QoS) from the desktop across the VoIP backbone and back again. Advanced Unified Communications features such as Outlook integration, soft phones, real-time presence, chat, multimedia conferencing, video calling, unified messaging and mobility are also part of a standard CaaS deployment. And with CaaS, the feature set can continue to evolve. Development and introduction of new features and applications are faster, easier and more economical because the service provider is doing the work for multiple end users across a scalable platform No Upfront Capital Expenses: Since cloud services are supposed to lower capital expenditure and focus more on operating expenditure, by implementing CaaS, consumers can build up their communication infrastructure without any upfront cost. They just need to pay it as a service. Flexibility in Features: Since cloud is a multi-tenant architecture, cloud vendors have to manage multiple customers and look after the features that they want. What this allows cloud vendor is to add more advanced features and flexibility in their service model. Economies of scale also mean that the service provider is not tied to a single vendor investment and can leverage bestof-breed providers like Cisco, Microsoft and Nortel much more economically than an independent enterprise. No Risk of Obsolescence: Technology changes rapidly and are obsolete within few years of introduction. With CaaS, companies are always privileged with new technologies as cloud vendors keep on updating their equipment’s and technologies to sustain in market. No Data Center Cost: As a prime advantages of cloud computing, while using CaaS infrastructure, organization need not invest on expensive servers, cooling system and electric equipment. With monthly/ yearly recurring cost, organization can dramatically cut down the management cost of data center as well. Guaranteed Business Continuity: With CaaS, organization can be hugely benefitted with guaranteed business continuity as cloud service providers proactively plans for Business Continuity Planning for their customers. Service uptime is guaranteed even if any catastrophic disaster strikes. Unified Communication Unified Communications (UC) might be defined as communications integrated to optimize business performance, and can describe a seamless set of voice, video and Web collaboration applications designed to enable advanced connectivity between employees, customers, partners and other stakeholders available on any device. In the large enterprise setting, Unified Communications allow employees to send and receive messages on various medium – guided by presence information or employee preference – switching calls between home lines and a mobile device, or accessing a voicemail via text or email. When well implemented, UC can save money, optimize business processes and improve communications by better connecting devices, media and applications, reducing latency, and opening new forms of collaboration. Some of the benefits of Unified Communication are as below: a. Efficient Communication: Users can communicate more efficiently by having access to all communications at one time and being free to share, forward, or manage them in the way that's most convenient or effective for the given communication. b. Anywhere Access: Unified messaging provides alternative methods of accessing communications. By merging e-mail, voice, and other communications, users can get voice messages in e-mail, have e-mail dictated over the phone, or access communications via the Web. c. Collaboration: Collaborative approach of communication can be helpful in achieving immediacy, simplicity and interoperability of communication. In this way, business can sense and respond more quickly to changing environment. d. Business Process Integration: Business processes can be integrated to each other for more efficiency. Many business entities and functions can be incorporated in one platform to make processes more agile and responsive. Infrastructure as a Service Infrastructure as a Service (IaaS) is one of the three fundamental service models of cloud computing alongside Platform as a Service (PaaS) and Software as a Service (SaaS). Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The client typically pays on a per-use basis. Clients are able to self-provision this infrastructure, using a Web-based graphical user interface that serves as an IT operations management console for the overall environment. API access to the infrastructure may also be offered as an option. A typical Infrastructure as a Service offering can deliver the following features and benefits: Scalability; resource is available as and when the client needs it and, therefore, there are no delays in expanding capacity or the wastage of unused capacity No investment in hardware; the underlying physical hardware that supports an IaaS service is set up and maintained by the cloud provider, saving the time and cost of doing so on the client side Utility style costing; the service can be accessed on demand and the client only pays for the resource that they actually use Location independence; the service can usually be accessed from any location as long as there is an internet connection and the security protocol of the cloud allows it Physical security of data center locations; services available through a public cloud, or private clouds hosted externally with the cloud provider, benefit from the physical security afforded to the servers which are hosted within a data center No single point of failure; if one server or network switch, for example, were to fail, the broader service would be unaffected due to the remaining multitude of hardware resources and redundancy configurations. For many services if one entire data center were to go offline, never mind one server, the IaaS service could still run successfully. On Demand Computing: On-demand (OD) computing is an increasingly popular enterprise model in which computing resources are made available to the user as needed. The resources may be maintained within the user's enterprise, or made available by a service provider. The on- demand model evolved to overcome the challenge of being able to meet fluctuating resource demands efficiently. Because demand for computing resources can vary drastically from one time to another, maintaining sufficient resources to meet peak requirements can be costly. On-demand computing products are rapidly becoming prevalent in the marketplace. Computer Associates, HP, IBM, Microsoft, and Sun Microsystems are among the more prominent on-demand vendors. These companies refer to their on-demand products and services by a variety of names. Concepts such as grid computing, utility computing, autonomic computing, and adaptive management seem very similar to the concept of on-demand computing. The major advantage of On Demand Computing (ODC) is low initial cost, as computational resources are essentially rented when they are required. This provides cost savings over purchasing them outright. (Amazon EC2): Amazon Elastic Compute Cloud (EC2) is a central part of Amazon cloud computing platform Amazon Web Services (AWS). EC2 allows users to rent virtual computers on which to run their own computer applications. EC2 allows scalable deployment of applications by providing a Web service through which a user can boot an Amazon Machine Image to create a virtual machine, which Amazon calls an "instance", containing any software desired. A user can create, launch, and terminate server instances as needed, paying by the hour for active servers, hence the term "elastic". It reduces the time required to obtain and boot new server instances to minutes, allowing customers to quickly scale capacity as their computing demands dictate. It changes the economics of computing by allowing clients to pay only for capacity they actually use. It provides developers the tools needed to build failure-resilient applications and isolate themselves from common failure scenarios. To use the EC2, a subscriber creates an Amazon Machine Image (AMI) containing the operating system, application programs and configuration settings. Then the AMI is uploaded to the Amazon Simple Storage Service (Amazon S3) and registered with Amazon EC2, creating a so-called AMI identifier (AMI ID). Once this has been done, the subscriber can requisition virtual machines on an as-needed basis. Capacity can be increased or decreased in real time from as few as one to more than 1000 virtual machines simultaneously. Billing takes place according to the computing and network resources consumed. The idea of EC2 is to lighten the cost of buying servers to host a system, but more importantly to eliminate the wasted time systems engineers devote to managing hard assets. Instead of buying servers to increase capacity or add new features, you simply buy more gigabytes on EC2. Amazon sells it in subscription form, with subscriptions based on how much capacity you use. Characteristics of Amazon EC2 (http://en.wikipedia.org/wiki/Amazon_ec2) a. Persistent Storage b. Elastic IP Addresses c. Amazon Cloud Watch d. Automated Scaling e. Reliability Monitoring as a Service Monitoring-as-a-Service is an outsourced service to provide security mainly to platforms that are run on the Internet for conducting business. Maas became highly popular in the last decade. Since the advent of Cloud Computing, its popularity has increased even more. Safe monitoring involves protecting a company or other institution / organization from cyber threats, in which a team prepared is crucial to maintain the confidentiality, integrity and access to IT assets. Many industry regulations require organizations to monitor their security environment, server logs, and other information assets to ensure the integrity of these systems. However, conducting effective security monitoring can be a daunting task because it requires advanced technology, skilled security experts, and scalable processes—none of which come cheap. MaaS security monitoring services offer real-time, 24/7 monitoring and nearly immediate incident response across a security infrastructure— they help to protect critical information assets of their customers Protection against Internal and External Threats Security monitoring services can improve the effectiveness of a customer security infrastructure by actively analyzing logs and alerts from infrastructure devices around the clock and in real time. Typical services provided by many MaaS vendors are described below. Early Detection An early detection service detects and reports new security vulnerabilities shortly after they appear. Generally, the threats are correlated with third-party sources, and an alert or report is issued to customers. This report is usually sent by email to the person designated by the company. Security vulnerability reports, aside from containing a detailed description of the vulnerability and the platforms affected, also include information on the impact the exploitation of this vulnerability would have on the systems or applications previously selected by the company receiving the report. Most often, the report also indicates specific actions to be taken to minimize the effect of the vulnerability, if that is known. Platform, Control, and Services Monitoring Platform, control, and services monitoring is often implemented as a dashboard interface and makes it possible to know the operational status of the platform being monitored at any time. It is accessible from a web interface, making remote access possible. Each operational element that is monitored usually provides an operational status indicator, always taking into account the critical impact of each element. This service aids in determining which elements may be operating at or near capacity or beyond the limits of established parameters. By detecting and identifying such problems, preventive measures can be taken to prevent loss of service. Intelligent Log Centralization and Analysis Intelligent log centralization and analysis is a monitoring solution based mainly on the correlation and matching of log entries. Such analysis helps to establish a baseline of operational performance and provides an index of security threat. Alarms can be raised in the event an incident moves the established baseline parameters beyond a stipulated threshold. These types of sophisticated tools are used by a team of security experts who are responsible for incident response once such a threshold has been crossed and the threat has generated an alarm or warning picked up by security analysts monitoring the systems. Vulnerabilities Detection and Management Vulnerabilities detection and management enables automated verification and management of the security level of information systems. The service periodically performs a series of automated tests for the purpose of identifying system weaknesses that may be exposed over the Internet, including the possibility of unauthorized access to administrative services, the existence of services that have not been updated, the detection of vulnerabilities such as phishing, etc. The service performs periodic follow-up of tasks performed by security professionals managing information systems security and provides reports that can be used to implement a plan for continuous improvement of the systems security level. Continuous System Patching/Upgrade Security posture is enhanced with continuous system patching and upgrading of systems and application software. New patches, updates, and service packs for the equipment operating system are necessary to maintain adequate security levels and support new versions of installed products. Keeping abreast of all the changes to all the software and hardware requires a committed effort to stay informed and to communicate gaps in security that can appear in installed systems and applications. Intervention, Forensics, and Help Desk Services Quick intervention when a threat is detected is crucial to mitigating the effects of a threat. This requires security engineers with ample knowledge in the various technologies and with the ability to support applications as well as infrastructures on a 24/7 basis. MaaS platforms routinely provide this service to their customers. When a detected threat is analyzed, it often requires forensic analysis to determine what it is, how much effort it will take to fix the problem, and what effects are likely to be seen. When problems are encountered, the first thing customers tend to do is pick up the phone. Help desk services provide assistance on questions or issues about the operation of running systems. This service includes assistance in writing failure reports, managing operating problems, etc. Real-Time Log Monitoring Enables Compliance Security monitoring services can also help customers comply with industry regulations by automating the collection and reporting of specific events of interest, such as log-in failures. Regulations and industry guidelines often require log monitoring of critical servers to ensure the integrity of confidential data. MaaS provider’s security monitoring services automate this time consuming process. Platform as a Service Platform as a service (PaaS) is a category of cloud computing services that provide a computing platform and a solution stack as a service. Along with software as a service (SaaS) and infrastructure as a service (IaaS), it is a service model of cloud computing. PaaS offerings facilitate the deployment of applications without the cost and complexity of buying and managing the underlying hardware and software and provisioning hosting capabilities. Technically, a PaaS is an Application Platform comprised of an operating system, middleware and other software that allows applications to run on the cloud with much of the management, security, scaling and other stack related headaches abstracted away. This allows you to focus on two things: customers and developing your application. Let the PaaS deal with system administration details like setting up servers or VMs, installing libraries or frameworks, configuring testing tools, etc. Platform as a Service allows users to create software applications using tools supplied by the provider. PaaS services can consist of preconfigured features that customers can subscribe to; they can choose to include the features that meet their requirements while discarding those that do not. PaaS works on top of IaaS and will do all of that work automatically. The Traditional On-Premises Model The traditional approach to developing and running applications on-premises has always been complex, expensive and risky. Producing your own solution never brought any guarantee of success. Each application has been designed to meet their specific requirements within each business. Each solution requires a specific programming hardware, an operating system, a database, often a middle-ware package, mail and web servers, etc. Once environment was created in hardware and software, a team of developers had to navigate a complex programming platform to build their own applications. Additionally, a team of network, database and system management was needed to keep everything in perfect driving conditions. Inevitably, developers were forced to change the application on behalf of a detail of the business, generating new cycles of testing before being distributed. PaaS model offers a choice of faster and more cost-effective application development and delivery. Furthermore, PaaS provides all the infrastructure needed to run applications over the Internet. Just like Google, iTunes and Youtube, this cloud computing model allows new functionality to be delivered in emerging markets through web browsers. PaaS is based on a model of mediation or subscription, and users only pay for what they use. The PaaS model in its range also includes other facilities such as, application design and development, testing, deployment and hosting as well as integration, security, scalability, storage, status management, control panel, etc. Characteristics of PaaS 1. Multi-tenant architecture A PaaS offering must be multi-tenanted. A multi-tenant platform is one that uses common computing resources including hardware, operating system, software (i.e. application code), and a single underlying database with a shared schema to support multiple customers simultaneously. This is in direct contrast to the traditional client/server architecture, which requires an entire stack of hardware and software to be dedicated to each tenant (customer). 2. Customizable /Programmable User Interface PaaS offering should provide the ability to construct highly flexible user interfaces via a simple “drag & drop” methodology that permits the creation and configuration of UI components on the fly. Furthermore, given the growing set of Web devices, additional flexibility to use other technologies such as CSS, AJAX and Adobe Flex to specify the appearance of the application’s interface should be available to the UI designer. 3. Unlimited Database Customizations Database used by application should have option of customization for more flexibility in application development. Specifying relationships between objects, a key requirement of any sophisticated business application, must be possible through the declarative Web-based interface. Other mandatory functions include the ability to incorporate validation rules and permissions at the object/field level and the ability to specify auditing behavior. 4. Automation PaaS environments automate the process of deploying applications to infrastructure, configuring application components, provisioning and configuring supporting technology like load balancers and databases, and managing system change based on policies set by the user. While IaaS is known for its ability to shift capital costs to operational costs through outsourcing, only PaaS is able to cut down costs across the development, deployment and management aspects of the application lifecycle. 5. Security The PaaS offering should provide a flexible access control system that allows detailed control over what users of the SaaS application can see and the data each user can access. Definition of access from the application level (including tabs, menus, objects, views, charts, reports and workflow actions) to the individual field level should be possible. Defining an access control model should be possible through the creation of groups and roles and the assignment of users to either groups or roles. 6. Runtime Framework: This is the “software stack” aspect of PaaS, and perhaps the aspect that comes first to mind for most people. The PaaS runtime framework executes end-user code according to policies set by the application owner and cloud provider. PaaS runtime frameworks come in many flavors, some based on traditional application runtimes, others based on 4GL and visual programming concepts, and some with pluggable support for multiple application runtimes. Software as a Service Software as a service , sometimes referred to as "on-demand software", is a software delivery model in which software and associated data are centrally hosted on the cloud. SaaS is typically accessed by users using a thin client via a web browser. In this model, the software is not hosted on the customers' individual computers. Under the SaaS model, a vendor is responsible for the creation, updating, and maintenance of software. Customers buy a subscription to access it, which includes a separate license, or seat, for each person that will use the software. SaaS has become a common delivery model for many business applications, including accounting, collaboration, customer relationship management (CRM), management information systems(MIS), enterprise resource planning (ERP), invoicing, human resource management (HRM), content management (CM) and service desk management. The emergence of SaaS as an effective software-delivery mechanism creates an opportunity for IT departments to change their focus from deploying and supporting applications to managing the services that those applications provide. Unlike traditional software which is conventionally sold as a perpetual license with an up-front cost (and an optional ongoing support fee), SaaS providers generally price applications using a subscription fee, most commonly a monthly fee or an annual fee. Consequently, the initial setup cost for SaaS is typically lower than the equivalent enterprise software. SaaS vendors typically price their applications based on some usage parameters, such as the number of users ("seats") using the application. However, because in a SaaS environment customers' data reside with the SaaS vendor, opportunities also exist to charge per transaction, event, or other unit of value. Benefits of SaaS (Hope now you can explain all): Save money by not having to purchase servers or other software to support use. Focus Budgets on competitive advantage rather than infrastructure. Monthly obligation rather than up front capital cost. Reduced need to predict scale of demand and infrastructure investment up front as available capacity matches demand. Multi-Tenant efficiency Flexibility and scalability Security Characteristics of SaaS Simple and quick system implementation: As Saas sits on top of PaaS and IaaS, deploying any enterprise level software becomes easy and quick as SaaS inherits all the features of underlying infrastructure. Also since SaaS is scalable, any user request can be addressed with required elasticity. Transparent and low pricing: With common infrastructure, cloud vendor can leverage their infrastructure with lower cost and transparency. End result of this directly impacts customer cost of software implementation as they gets it cheaper with enhanced security and high availability. Multitenant Architecture: A multitenant architecture, in which all users and applications share a single, common infrastructure and code base that is centrally maintained. Because SaaS vendor clients are all on the same infrastructure and code base, vendors can innovate more quickly and save the valuable development time previously spent on maintaining numerous versions of outdated code. Easy software maintenance and Customization: The ability for each user to easily customize applications to fit their business processes without affecting the common infrastructure. Because of the way SaaS is architected, these customizations are unique to each company or user and are always preserved through upgrades. That means SaaS providers can make upgrades more often, with less customer risk and much lower adoption cost. Better Access: Improved access to data from any networked device while making it easier to manage privileges, monitor data use, and ensure everyone sees the same information at the same time.